
Sökresultat:
1941 Uppsatser om Network security and countermeasures - Sida 19 av 130
Parental experiences when children are undergoing emergency surgery/Föräldrars upplevelser i samband med att deras barn genomgår en akut operation
When a child is hospitalized, it is usually more than one person who needs attention ? i.e. the child as well as its parents. The emergency ward environment and surgery rooms are unfamiliar and the parents feel anxious, insecure and uncertain about how to act. They are expected to participate in the child?s care, cope with their own anxiety and simultaneously convey a sense of security and stability to the child.
Gruppverksamhet för barn till missbrukare : en jämförande studie av två gruppmodeller
In Sweden approximately ten percent of all children grows up in a family where at least one parent is having an alcohol related addiction. Since 1998 the development of group activities for children in this situation has been immense. The aim of group activities is to break the child's isolation and make them feel that they are not lonely in their experiences, give them knowledge about addiction and relive the pressure of guilt and responsibility.In a comparative study we examined studied how two different group activity models one with the conception of illness and one without, use the children's network to support the group process. The aim was also to find each models definition of the "normal family", since we understood the groupactivity as a part in the normalization process. We reached our aim through interviews with group leaders and by literature studies.
Effektiva gränsorganisationer: en fallstudie av regionkontoret North Sweden European Office
Regional European Offices with the purpose to represent regions and municipalities in the EU-system have had a substantial expansion over the last years. One example is the North Sweden European Office for the counties of Norrbotten and Västerbotten, consisting of seven different headmen who are representing both the private sector as well as the public system. This diverse leadership representation makes North Sweden a very good example on a so called Quango, organisations that stand under simultaneous influence from both public and private sectors. These Quangos opens up new possibilities to solve public problems, but they also bring together two different working models which is not always easy to handle for a Quango. According to earlier surveys some characteristic Quango problems within North Sweden exist, for example the ability to prioritize and thereby be as effective as possible.
Att skapa grunden tillkassasystemsapplikationer för Android : Undersökande arbete samtimplementation
This paper was made together withTechPay AB, by their request.The dissertation has been divided into two separate parts; one of which is fully theoretical, with the focus on the security requirements of a digital cash register, and how to meet these requirements.The second part covers the implementation of anAndroid-oriented Java-library,created with help from the security requirements found in the first part. The purpose of this library is to make it easier to develop a cash register that uses payment terminals from TechPay.This paper also covers different communication protocols, encryption techniques and recommendations from authorities, banks and Android. This paper also contains a small review of how users are validated in applications on the current market that handles money transactions..
Historien om en svensk säkerhetspolitisk agenda - Förklaring av processen, politiken, policyn och entreprenören för Sveriges militära insats i Tchad
The aim of this study is to analyze the process of an agenda setting and see how a specific issue came to materialize on the security policy agenda. The empirical goal of the study is to see why Sweden chose to participate in the EU-led operation to Chad, and how that process came to be? The analysis is based upon Kingdon's multiple streams theory (2003) where he distinguishes the process into three streams. Central for his theory is the coupling of these streams and the importance of a policy entrepreneur. I complement Kingdon's theory of policy entrepreneurs by taking inspiration from Hinnfors (1995), Gustavsson (1999) and especially Eriksson (2000) and their analysis of policy change and agenda setting.
Att Visualisera Oron : Hotet, subjektet och terrorattentatet i Stockholm 2010
This study examines which socially constructed threats and subjects of security existed during the aftermath of the terrorist attacks in Stockholm 2010. With ideas of identity and difference as a starting point the theoretical framework is then developed with ideas from the new critical security studies including key subjects such as attributes, risk, imaging and visualisation. The study will be executed with the use of a discourse analysis approach using newspaper articles and chronicles as the principal empirical material. The analysis will then follow two separate themes. Firstly, the different threats and subjects of security will be deduced, and also, how these social constructions inevitably create each other and require each other to continue existing.
Konstruktionsforslag for kabelprovningsutrustning av serieresonanstyp
In order to decrease the disturbance from a cable testing equipment, the company Ericsson Network Technologies in Falun determined to design a new series resonant test system with a lower frequency. The new equipment is of series resonant type with a system frequency of 500 Hz. This equipment consists of an inductor, a capacitor and a voltage source. The voltage source is the same as the old one, the cable acts as the capacitor but the inductor has to be designed especially for the new equipment. In this thesis work several air coil inductor types were examined.
Webb-tv ? en konkurrent eller ett komplement till linjär tv? : En studie av hur SVT och TV4 ser på sin webb-tv
The linear televison have dominated the supply of moving pictures, but this is about to change with the possibility to consume it via the Internet.I n this thesis we have studied how the two Swedish tv-network companies, SVT and TV4 are working with their web TV and if their online services have affected the linear TV. To limit the size of the study we chose two network companies that provide the most popular tv channels and web services in Sweden. To gather data from these two companies we conducted qualitative interviews with people at the networks. We came to the conclusion that SVT and TV4 doesn't find that their web TV services (called SVT Play and TV4 Play) are competing with the linear TV. They rather regard them as assets to broaden their services.
Försäkringskassan- effektiv och/eller rättssäker?
The public administration and its officials have a number of values which they have to relate to in their work. The values are a set of democratic and economic values.This study?s purpose is to examine how the officials at the National Insurance Office in Sweden give priority to these values. The study is performed by interviews with officials at two insurance offices.The study shows that the officials in a high degree value the democratic values legal security and public ethics. In turn they experience that productivity, which is an economic value, is being promoted in a high degree from the management.
Den svenska neutralitetsdebatten 1988-1992
Starting at the end of the Cold War, this publication assesses the impact of the upheavals in Eastern Europe and the atrophic Soviet Union on the Swedish doctrine of neutrality with its 200 year old tradition. Since the end of world war two the proximity of the Soviet Union had constituted the major impetus for upholding a position of neutrality and as this vanished a pressure for change was created. This essay works with a theoretical framework delineated by Kjell Goldmann and under this disposition, the Swedish tradition of neutrality, governmental positions, opposition and four major influential newspapers are studied. The standings of each variable are canvassed in an attempt to explain the development of Swedish security policy during the crucial years of 1988-1992..
Invandrares nätverk och sociala kapital
Abstract The increased focus on social capital theory has made its way into labour economics. This has led to the creation of a vast literature about the use of networks and informal search methods in the labour-market, a literature that to some extent also deals with immigrants search behaviour and their relatively high unemployment rate. Characteristic for the literature in the area is the lack of analysis of actual networks. Which types of contacts do these networks contain; how are the networks used in the labour-market; and which type of network generates a high amount of social capital. These questions are important for the general understanding of how social capital functions, within the labour-market, but also for the understanding of how immigrants use their networks in order to find themselves jobs.
Analys av systemfaktorers påverkan på tillförlitligheten i distributionsnät
In this master thesis outage statistics covering tree years from two distribution grids are analyzed with the purpose to deduce which factors yield outages. The statistics are extensive therefore allowing in-depth analysis of both customer and system related factors. From this starting point and as a model of explanation energy not supplied is studied as the consequence and the measurement of the inconvenience caused by outages. Different methods for calculating energy not supplied are developed and studied and put in comparison to the method used in Network Performance Assessment Model, which is the Swedish frame work for regulating electricity distribution.Analysis of the outage statistics show a relation between the type category of customer and outages that can be deduced to the variance and the density associated with that customer category. Prioritization of different customer categories is elevated also in this aspect.
DNS prestanda
Use of computers and computer networks is nowadays a part of everyday life. You do not use them only at home when you sit at you computer, but you can use them all the time everywhere. This can involve everything from surf to any website when you are at home, to checking your email on your mobile when you are on your way to work. Most people do not think about how it really works when they try to access a web page by typing the address into their browser, but something that most people probably notice is how long it can sometimes take to access a web page.All items which are directly connected to the IP network have a unique IP address that is used to make it possible to communicate. The IP address is either a period separated sequence of digits representing 32 bits or a colon separated sequence of digits representing 128 bits, depending on whether the address is an IPv4 or IPv6 address.
The Capital Structure Puzzle of SME's - Evidence from the Swedish Security Industry
The purpose of this thesis is to ascertain the main determinable factors of Swedish SMEs capital structure decisions and to investigate whether existing capital structure theories are applicable on Swedish SME financing. We have used panel data to run regressions of various capital structure determinants on three measures of capital structure; short- term debt, long-term debt and total debt. We found that growth opportunities, profitability and age are the most important capitalstructures determinants for our sample. Firm size shows a small explanatory result but the effective tax rate and the asset tangibility do not seem to explain the capital structure at all. Thematurity matching principle is considered significant..
Trådlösa Nätverk : säkerhet och GPU
Trådlosa nätverk är av naturen sårbara for avlyssning för att kommunikationen sker med radiovagor. Därfor skyddas trådlosa nätverk med kryptering. WEP var den första krypteringsstandarden som användes av en bredare publik som senare visade sig innehålla flera sårbarheter. Följden blev att krypteringen kunde förbigås på ett par minuter. Därför utvecklades WPA som ett svar till sårbarheterna i WEP.